{"id":9126,"date":"2016-10-27T12:38:50","date_gmt":"2016-10-27T12:38:50","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/protecting-your-erp-data\/"},"modified":"2021-03-04T14:49:27","modified_gmt":"2021-03-04T14:49:27","slug":"protecting-your-erp-data","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/","title":{"rendered":"Protecting Your ERP Data"},"content":{"rendered":"<p>When the subject of corporate data security comes up, the conversation usually turns to outside influencers such as hackers, malware, internal espionage and high-profile breaches. Those are issues that every company should protect against, but they are not the topic of my blog today. What I\u2019d like to address are basic security measures that will protect your data (and your ERP investment) from the mistakes of well-intentioned employees.<!--more--><\/p>\n<p>It may seem difficult to believe, but I have a customer that continues to allow its employees to log in to their ERP software <em>without a password<\/em>. Why? It\u2019s faster and easier, they claim, they trust their employees, and they have a strong firewall to protect them from external threats. Besides, their data is backed up regularly, and not interesting or high-value enough to attract attention from the criminal element. So what\u2019s the big deal?<\/p>\n<p>From the support-desk perspective, it\u2019s potentially a <em>very<\/em> big deal. I have seen it happen in the past, and I will no doubt see it again: a user can\u2019t complete his job because some admin task hasn\u2019t been done. Thinking that they\u2019re being clever and helpful, they simply log in as Admin and make what they believe are appropriate changes.<\/p>\n<p>Some users have gained a little ERP knowledge over the years \u2013 just enough to make a little change and create a very large and often complicated problem. With the best of intentions, they\u2019ll commit an admin <em>faux pas<\/em>, such as changing the module setups or invoice numbering while other users are still on the system. It takes, typically, a deeper level of knowledge to know that there are tasks that need to be performed when users are not logged in, and that some setup options, once selected, should <em>not<\/em> be deselected. You often need more-than-superficial knowledge to make the setting change without impacting on the whole module.<\/p>\n<p>Administrator rights for accessing a change of settings should not be gifted to just any old Joe. Placing all of your users into the Admin group is never a good idea. Make an investment in security and efficiency by setting up your users in groups that match their tasks. In the long run, doing this will save you time, and it will also make it harder for accidents to happen. If users have multiple roles within a company, they can always be setup with sub-groups that allow them to complete their appointed tasks.<\/p>\n<p>You can easily take this one step further, by setting up customised \u201cRoles\u201d. This makes users\u2019 screens less cluttered, allowing them to focus exclusively on the fields they need.<\/p>\n<p>Role-based security is an optional feature that consolidates existing security functions within SYSPRO, allowing them to be configured by role. Enabling an administrator to assign an operator to a role provides a much simpler mechanism for managing security \u2013 especially when dealing with a large number of users, or when adding new ones.<\/p>\n<p>Role-based security consolidates the following ERP features:<\/p>\n<ul>\n<li>User Interface<\/li>\n<li>eSignatures (previously configured by system, company, group or operator)<\/li>\n<li>Program Access (previously configured by group)<\/li>\n<li>Activities and Fields (previously configured by operator)<\/li>\n<li>Access Control (previously configured by operator \u2013 this includes items such as warehouse, branch, bank, job class, account and contact properties)<\/li>\n<li>Workflow settings<\/li>\n<\/ul>\n<p>SYSPRO ships with a list of standardized roles within Role Management. When Role Management is set up for the first time the option is provided to import this list, which contains generic roles that SYSPRO has identified as part of any organisation which purchases, manufactures and distributes items. The list can be imported and maintained in the organisations structure as required, and will help with the speed of setup and administration. Importing the standard roles does not delete or overwrite any roles you may have previously defined.<\/p>\n<p><strong><u>Knowing When (And How) To Purge<\/u><\/strong><\/p>\n<p>Since we\u2019re talking about internal security and well-intentioned mistakes, let\u2019s spend a moment on the \u201cPurge\u201d function in all the sub-ledger modules. Purge means delete. Definitely an Admin-Only function! Once purged, your data has been wiped away \u2013 it\u2019s gone forever, unless you have a vital, valid backup. Some users may not realise the irrevocable nature of the Purge command, and that is why security around purge programs needs to be exceptionally tight.<\/p>\n<p>For legislative and tax purposes a company needs to keep a number of year\u2019s records on file. Within the Module setup, on the History Tab, you may select the number of months to retain records. This should be double checked before the Purge function is run. And when the time comes to purge I always recommend that the company be copied into a \u201ctest\u201d company before the command is given \u2013 this access should also be an Admin Only task.<\/p>\n<p>For more information on how to ask for help, watch this brief video:<\/p>\n<div class=\"hs-responsive-embed hs-responsive-embed-youtube\"><iframe class=\"hs-responsive-embed-iframe\" src=\"\/\/www.youtube.com\/embed\/47MJh6Neaqs\" width=\"560\" height=\"314\" allowfullscreen=\"allowfullscreen\" data-service=\"youtube\"><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>When the subject of corporate data security comes up, the conversation usually turns to outside influencers such as hackers, malware, internal espionage and high-profile breaches. Those are issues that every company should protect against, but they are not the topic of my blog today. What I\u2019d like to address are basic security measures that will &#8230; <a title=\"Protecting Your ERP Data\" class=\"read-more\" href=\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\" aria-label=\"Read more about Protecting Your ERP Data\">Read more<\/a><\/p>\n","protected":false},"author":212,"featured_media":6739,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[31],"tags":[],"class_list":["post-9126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-erp-for-distribution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Your ERP Data<\/title>\n<meta name=\"description\" content=\"Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Your ERP Data\" \/>\n<meta property=\"og:description\" content=\"Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-27T12:38:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T14:49:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\"},\"author\":{\"name\":\"Roger Franklin\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd\"},\"headline\":\"Protecting Your ERP Data\",\"datePublished\":\"2016-10-27T12:38:50+00:00\",\"dateModified\":\"2021-03-04T14:49:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\"},\"wordCount\":810,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png\",\"articleSection\":[\"ERP for Distribution\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\",\"name\":\"Protecting Your ERP Data\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png\",\"datePublished\":\"2016-10-27T12:38:50+00:00\",\"dateModified\":\"2021-03-04T14:49:27+00:00\",\"description\":\"Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too.\",\"breadcrumb\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png\",\"width\":900,\"height\":410,\"caption\":\"tracey_protecting_your_erp_data.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Your ERP Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd\",\"name\":\"Roger Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png\",\"caption\":\"Roger Franklin\"},\"description\":\"As the Senior Solutions Architect at SYSPRO Australasia, Roger is responsible for providing expertise in selling, shaping, defining, implementing and quality assuring SYSPRO ERP solutions in the region. As a solution driven leader, he identifies gaps that exist in systems to ensure our solutions meet industry needs. Roger has a wealth of experience in delivering quality and innovative solutions that add tangible business value to manufacturers and distributors as they digitally transform.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/roger-franklin-australia\"],\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/roger-franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Your ERP Data","description":"Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Your ERP Data","og_description":"Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too.","og_url":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/","og_site_name":"SYSPRO Blog","article_published_time":"2016-10-27T12:38:50+00:00","article_modified_time":"2021-03-04T14:49:27+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png","type":"image\/png"}],"author":"Roger Franklin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Franklin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/"},"author":{"name":"Roger Franklin","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd"},"headline":"Protecting Your ERP Data","datePublished":"2016-10-27T12:38:50+00:00","dateModified":"2021-03-04T14:49:27+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/"},"wordCount":810,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png","articleSection":["ERP for Distribution"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/","url":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/","name":"Protecting Your ERP Data","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png","datePublished":"2016-10-27T12:38:50+00:00","dateModified":"2021-03-04T14:49:27+00:00","description":"Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too.","breadcrumb":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/tracey_protecting_your_erp_data.png","width":900,"height":410,"caption":"tracey_protecting_your_erp_data.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-distribution\/protecting-your-erp-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting Your ERP Data"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a9434511438ed1f62f4307ddcc7a23fd","name":"Roger Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/06\/Roger_Franklin_blog-150x150.png","caption":"Roger Franklin"},"description":"As the Senior Solutions Architect at SYSPRO Australasia, Roger is responsible for providing expertise in selling, shaping, defining, implementing and quality assuring SYSPRO ERP solutions in the region. As a solution driven leader, he identifies gaps that exist in systems to ensure our solutions meet industry needs. Roger has a wealth of experience in delivering quality and innovative solutions that add tangible business value to manufacturers and distributors as they digitally transform.","sameAs":["https:\/\/www.linkedin.com\/in\/roger-franklin-australia"],"url":"https:\/\/ca.syspro.com\/blog\/author\/roger-franklin\/"}]}},"metadata":{"_yoast_wpseo_focuskw":["Protecting Your ERP Data"],"_yoast_wpseo_focuskw_text_input":["Protecting Your ERP Data"],"_yoast_wpseo_title":["Protecting Your ERP Data"],"_yoast_wpseo_metadesc":["Your ERP data doesn\u2019t only need to be protected from hackers \u2013 sometimes well-meaning employees can pose a serious threat too."],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":[""],"_yoast_wpseo_linkdex":["64"],"_yoast_wpseo_metakeywords":[""],"_yoast_wpseo_is_cornerstone":[""],"_wp_page_template":["default"],"_thumbnail_id":["6739"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9126"}],"version-history":[{"count":0,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9126\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/6739"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}